Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
28
views
20
references
Top references
cited by
7
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
820
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
NEON Crypto
other
Author(s):
Daniel J. Bernstein
,
Peter Schwabe
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
20
Record
: found
Abstract
: not found
Book Chapter
: not found
Curve25519: New Diffie-Hellman Speed Records
Daniel J. Bernstein
(2006)
0
comments
Cited
53
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Faster Addition and Doubling on Elliptic Curves
Daniel J. Bernstein
,
Tanja Lange
(2007)
0
comments
Cited
38
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
David McGrew
,
John Viega
(2004)
0
comments
Cited
32
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 320-339
DOI:
10.1007/978-3-642-33027-8_19
SO-VID:
f6d79d60-17d9-4803-84aa-ad950641041f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
3D Hardware Canaries
pp. 23
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
pp. 41
Simple Photonic Emission Analysis of AES
pp. 58
Compiler Assisted Masking
pp. 76
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
pp. 92
How Far Should Theory Be from Practice?
pp. 107
Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
pp. 122
A Differential Fault Attack on the Grain Family of Stream Ciphers
pp. 140
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
pp. 155
Selecting Time Samples for Multivariate DPA Attacks
pp. 175
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
pp. 193
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
pp. 213
Practical Leakage-Resilient Symmetric Cryptography
pp. 233
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
pp. 251
Practical Security Analysis of PUF-Based Two-Player Protocols
pp. 268
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment
pp. 283
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
pp. 302
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
pp. 320
NEON Crypto
pp. 340
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware
pp. 356
Solving Quadratic Equations with XL on Parallel Architectures
pp. 374
Efficient Implementations of MQPKS on Constrained Devices
pp. 390
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
pp. 408
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation
pp. 426
Low-Latency Encryption – Is “Lightweight = Light + Wait”?
pp. 447
Attacking RSA–CRT Signatures with Faults on Montgomery Multiplication
pp. 463
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA
pp. 476
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
pp. 494
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs
pp. 512
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
pp. 530
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
pp. 548
An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor
Similar content
820
About thermalisation of 5s′ []01 and 5s′ []00 Neon level populations
Authors:
L. Lis
Thermodynamic Properties of Neon
Authors:
E. F. Yendall
Flickering Light: A History of Neon
Authors:
Ribbat Christoph
See all similar
Cited by
7
$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
Authors:
Tomoyasu Suzaki
,
Kazuhiko Minematsu
,
Sumio Morioka
…
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip
Authors:
J. Longo
,
E. De Mulder
,
D. Page
…
Gimli : A Cross-Platform Permutation
Authors:
Daniel J. Bernstein
,
Stefan Kölbl
,
Stefan Lucks
…
See all cited by